RSS feed Get our RSS feed

News by Topic

cloud era

Results 1276 - 1300 of 1439Sort Results By: Published Date | Title | Company Name
By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Most Financial Services Organizations (FSOs) are utilizing private clouds to become better overall businesses and to meet their biggest need - quickly and easily serving the customer.
Tags : 
     Sponsored by HP and Intel®
By: Sponsored by HP and Intel®     Published Date: Nov 15, 2012
This analysis compares various cloud offerings in the market. Discover resources available to help you assess your options and accelerate the launch of your initiative.
Tags : cloud computing, deployment, cloud infrastructure, cloud services, cloud provider
     Sponsored by HP and Intel®
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Aug 16, 2012
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, and improve application performance.
Tags : 
     Sponsored by HP and Intel® Xeon® processors
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to deploying, managing and scaling PostgreSQL in various environments, in the public cloud and on-premises. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. The eBook provides a detailed analysis of planning, day-one, and day-two challenges of PostgreSQL deployments, in the context of potential operating environments: ? Public cloud ? Private cloud ? Private DC (bare metal / VM)
Tags : 
     Stratoscale
By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
     Stripe
By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central
     Success Factors
By: Success Factors     Published Date: Aug 20, 2013
SuccessFactors Employee Central is the premier core HR solution in the cloud for small and medium businesses. Benefit from a single, unified system of record so all your decision data is in one place. Take advantage of self-service HR for all your employees and managers, not just for your HR staff. Get all the reporting you need, when you need it, for deeper insight  into your people and processes. Plus there’s IT-free operation and management for fewer upgrade hassles – and lower costs.
Tags : hr system, self-service hr, smb hr solutions, successfactors employee central, core hr, hris solution, hris application, hris system
     Success Factors
By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital
     SunGard
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : sungard, sungard availability services, cloud, cloud computing, cloud service, it operations, cost efficiency, flexibility
     SunGard Availability Services
By: SunGard Availability Services     Published Date: Nov 13, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : sungard, sungard availability services, cloud, cloud computing, cloud service, it operations, cost efficiency, flexibility
     SunGard Availability Services
By: Symantec     Published Date: Jul 09, 2017
This paper describes how malware is evolving, how it functions, and how it can be identified, neutralized, and blocked by what we refer to as cloud generation malware analysis, which is available as a robust enterprise cloud service. Let’s start with how the blizzard of advanced malware alarms is affecting IT security teams.
Tags : cloud, malware, threat and vulnerability management, security
     Symantec
By: Symantec     Published Date: Jul 31, 2017
The Shadow Data Report, published by Symantec, addresses key trends and challenges faced by enterprises securing data in cloud apps and services.
Tags : data, data security, cloud, threat and vulnerability management, cloud applications
     Symantec
By: Symantec     Published Date: Jul 31, 2017
Every organization uses cloud apps, sanctioned or unsanctioned by IT.
Tags : cloud, cloud applications, security, threat and vulnerability management
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : secure web gateway, web application, cloud application, encryption, web threats
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
     Symantec
By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in today’s enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : data protection, security, encryption, cloud, web security
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : cloud, cloud service providers, cloud security, cloud applications
     Symantec
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec.cloud     Published Date: Jan 26, 2011
This report examines the new generation of threats, vulnerabilities and attacks, and explores the role that cloud security strategies can play in managing core risks to organizations of all sizes and across all industries.
Tags : symantec cloud, web threats, threats, vulnerabilities, cloud security, productivity, mobile communication
     Symantec.cloud
By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer you’ve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
     Talend
By: Tely     Published Date: Apr 07, 2016
In this report, Ira M. Weinstein and Saar Litman are explaining features and benefits of the Tely solution.
Tags : telyhd 200, video conference cloud, tely labs telyhd, vidyo pricing, equipment for video conferencing, tely 200, video conferencing hd, 11 telyhd 01 01
     Tely
By: Tely     Published Date: Apr 07, 2016
See for yourself how Tely 200 compares to other small room systems.
Tags : telyhd 200, video conference cloud, tely labs telyhd, vidyo pricing, equipment for video conferencing, tely 200, video conferencing hd, 11 telyhd 01 01
     Tely
By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : vulnerability management, analyst report, idc
     Tenable
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics